Abstract
Routers, switches, and hubs are some of the networking devices used to establish connectivity among networked devices. However, they don't provide much control over access and security. Securing the network requires special-purpose devices like intrusion detection systems, firewalls, and honeypots. This chapter introduces these devices, their types, and the architectural considerations for their placement in the network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). IDSes, Firewalls, and Honeypots. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_13
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_13
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books